hieuha / WIFI-ShieldLinks
Protect your privacy and security online
☆10Updated 9 years ago
Alternatives and similar repositories for WIFI-Shield
Users that are interested in WIFI-Shield are comparing it to the libraries listed below
Sorting:
- Malware Control Monitor☆88Updated 10 years ago
- Various malware, packer, crypter, etc. detection and analysis tools☆90Updated 10 years ago
- IRON-HID: Create Your Own Bad USB Device (Presented at HITBSecConf 2016)☆62Updated 7 years ago
- AutoBrowser Screenshot☆49Updated 9 years ago
- A hacked together PHP shell designed to be stealthy and portable☆52Updated 11 years ago
- Clone of hidden tear written in C++☆70Updated 5 years ago
- USB Attack to Decrypt Wi-Fi Communications☆32Updated 10 years ago
- Universal MITM web server☆107Updated 8 years ago
- Automatic backdooring apk with meterpreter (PoC)☆52Updated 9 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- ☆33Updated 8 years ago
- List of penetration testing tools.☆23Updated 5 years ago
- everything that does not fit elsewhere☆12Updated 7 years ago
- The Web Exploit Detector is a Node.js application used to detect possible infections, malicious code and suspicious files in web hosting …☆87Updated 8 years ago
- Android based APT exploitation framework☆36Updated 10 years ago
- Offline Digital Forensics Tool for Binary Files☆38Updated 7 years ago
- Phishing attack w/HTML5 offline cache framework based on Squid proxy☆31Updated 13 years ago
- Scripts to create your own MITM'ing, packet sniffing WiFi access point☆147Updated 10 years ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Updated 8 years ago
- Kerang is a Another Webshell Backdoor, For Educational Purposes!☆15Updated 8 years ago
- Source code to the Malicious Demon Hunter Exploit Kit☆58Updated 10 years ago
- Purposely vulnerable ActiveX Control to teach about exploitation in a browser-based environment.☆71Updated 10 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆25Updated 9 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆51Updated 9 years ago
- Practice and learning in the world of C RE and exploit analysis☆33Updated 7 years ago
- Simple reverse ICMP shell☆41Updated 12 years ago
- analyze a web-based network traffic 🕶 to detect central command and control servers☆79Updated 7 years ago
- Search exploits in multiple exploit databases!☆85Updated 5 years ago
- VirusTotal tools☆92Updated 4 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Updated 9 years ago